Phishing
| Id | c3771865-b647-46a7-9be5-a96c418cebc0 |
| Rulename | Phishing |
| Description | New phishing with severity High found |
| Severity | High |
| Tactics | InitialAccess Discovery |
| Techniques | T1566 T1087 |
| Required data connectors | CBSPollingIDAzureFunctions |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/Phishing.yaml |
| Version | 1.0.4 |
| Arm template | c3771865-b647-46a7-9be5-a96c418cebc0.json |
CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Phishing" | where status_s != "Closed" or status_s != "Resolved"
triggerOperator: gt
incidentConfiguration:
groupingConfiguration:
matchingMethod: AllEntities
enabled: false
reopenClosedIncident: false
lookbackDuration: PT5H
createIncident: true
queryFrequency: 5m
requiredDataConnectors:
- connectorId: CBSPollingIDAzureFunctions
dataTypes:
- CBSLog_Azure_1_CL
relevantTechniques:
- T1566
- T1087
entityMappings:
- entityType: URL
fieldMappings:
- identifier: Url
columnName: subject_s
query: |
CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Phishing" | where status_s != "Closed" or status_s != "Resolved"
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/Phishing.yaml
suppressionEnabled: false
queryPeriod: 5m
name: Phishing
status: Available
kind: Scheduled
description: |
'New phishing with severity High found'
id: c3771865-b647-46a7-9be5-a96c418cebc0
version: 1.0.4
eventGroupingSettings:
aggregationKind: SingleAlert
tactics:
- InitialAccess
- Discovery
severity: High
suppressionDuration: 5h